PERIMETER PROTECTION MODEL
STAGE
|
TECHNOLOGY
|
STAGE
|
TECHNOLOGY
|
It includes solutions that protect against intrusions at the network and cloud levels, considering the protection of user navigation and, in general terms, solutions that face external threats that enter through the various communication protocols.
It encompasses solutions that protect from advanced and persistent ransomware, malware, and threats that encompass multiple tactics, techniques, and procedures. These threats are very difficult to identify as they have changing and stealthy behaviors, therefore advanced and complementary controls are needed to detect them.
STAGE |
TECHNOLOGY |
Ingress and Communication Control. |
SASE |
Lateral Movement Detection. |
EDR |
Movement and Access Prevention. |
PAM |
STAGE |
TECHNOLOGY |
Reduce the attack surface. |
CSPM |
Access control. |
MFA |
Detect and prevent (cloud). |
DLP /CASB |
Detect and prevent (network). |
DLP |
It includes solutions that protect internal users, their devices and systems against cyberattacks, as well as solutions that allow users to monitor their activity and thus detect anomalous or negligent behavior in time.
A hybrid Datacenter has certain components in a physical location with physical or virtual servers and appliances, and others are in servers / appliances in the cloud, therefore the solutions contemplated in this model are aimed at protecting both types of components and controlling access to them.
STAGE |
TECHNOLOGY |
Decrease attack surface |
Vulnerability Scanner |
Access control. |
Microsegmentation |
Detect and prevent. |
Cloud Workload |
STAGE |
TECHNOLOGY |
Integration and development. |
SAST |
Testing / QA |
IAST |
Protection of applications in production |
DAST |
It includes solutions that protect cyberattack applications throughout the life cycle, from development through the QA stage until they are transferred to production.
It covers the solutions that protect OT Networks against advanced threats and give visibility to changes and anomalies that occur on the devices of this type of network.
STAGE |
TECHNOLOGY |
Decrease the attack surface. |
Monitoring and Visibility of OT Networks. |
Access control. |
NAC |
Detect and prevent (network). |
Monitoring and Visibility of OT Networks |
STAGE |
TECHNOLOGY |
Detection and correlation |
SIEM |
Cyber intelligence |
Monitoring of digital assets in Deep and Dark Web |
Automation and orchestration |
SOAR |
Asset Management |
Asset Management |
This model considers solutions that are cross-cutting to previous security models, which aim to optimize cybersecurity operation processes, give visibility and detect threats early to take mitigation actions in a timely manner.